期刊文献+

基于信息熵的入侵事件依赖性研究 被引量:1

Study on the Intrusion Event Dependence Based on Information Entropy
下载PDF
导出
摘要 提出一种基于信息熵的依赖性分析方法,用入侵事件出现与否的概率进行定量的计算,从而挖掘出入侵事件之间的依赖关系。并提出依赖系数的概念来描述事件之间的依赖程度,最后给出了相应的试验结果。 The thesis proposes a dependence analytical method based on information entropy, carries on quantitative calculation with intrusion event appeared probability, mines dependence relation of intrusion events. And puts forward the concept of dependence coefficient to describe the degree of dependence between the events. Finally it gives the corresponding result of the experiment.
出处 《计算机工程》 CAS CSCD 北大核心 2004年第18期108-109,118,共3页 Computer Engineering
基金 湖北省科技攻关重大基金资助项目(2001AA104A105):"网络管理平台软件研究及产业化"
关键词 信息熵 入侵事件 依赖系数 数据挖掘 Information entropy Intrusion event Dependence coefficient Data mining
  • 相关文献

参考文献6

  • 1Ning P,Cui Y,Reeves D S.Analyzing Intensive Intrusion Alerts via Correlation.Workshop on Recent Advances in Intrusion Detection (RAID),2002:74-94
  • 2Valdes A,Skinner K.Probabilistic Alert Correlation.Workshop on Recent Advances in Intrusion Detection (RAID),2001:54-68
  • 3Debar H,Wespi A.Aggregation and Correlation of Intrusion-detection Alerts.Workshop on Recent Advances in Intrusion Detection (RAID),2001:85-103
  • 4McHugh J.Intrusion and Intrusion Detection.International Journal of Information Security,2001,1(1):14-35
  • 5Porras P A,Fong M W,Valdes A.A Mission-impact-based Approach to Infosec Alarm Correlation.Workshop on Recent Advances in Intrusion Detection (RAID),2002:95-114
  • 6ROSA MEO.Theory of Dependence Values.ACM Transaction on Database System,2000,25(3):380-406

共引文献1

同被引文献8

  • 1熊家军,李庆华.信息熵理论与入侵检测聚类问题研究[J].小型微型计算机系统,2005,26(7):1163-1166. 被引量:14
  • 2Lnnt T F,Jagaunathan R, Lee R et al. IDES :The enhanced pro- totype - a real time intrusion detection expert system [ J ]. Computers & Security, 1993,12 (4) :405 - 418.
  • 3D. E. Denning. An Intrusion - Detection Model [ J ]. IEEE Trans- action on Softwa, Engineering, 1987,13 ( 2 ) : 222 - 232.
  • 4Denning D E. An Intrusion - Detection Model [ J ]. IEEE Syrup on Security & Privacy, 1986 : 118 - 131.
  • 5Guha S, Rastogi R, Shim K. ROCK: A Robust Clustering Algo- rithm for Categorical Attributes [ J ]. Information Systems, 2000,25 ( 5 ) : 345 - 366.
  • 6X. Li, N. e. A Supervised Clustering Algorithm fur Computer Intrusion Detection [ J ]. Knowledge and Information Systems, 2005,8 (4) :498 -509.
  • 7Ie Wenke, Xiang Dong. Information -Thematic Measures for Anomaly Detection [ C ]//Proceedings of the IEEE Symposium on Security and Privacy ,2001 : 130 - 143.
  • 8E. Leon, O. Nasraouli, J. Gomez. Anomaly I)eteetinn Based on Unsupervised Niche Clustering with Application to Network Intrusion De- tectinn [ C ]//Proceedings of the Congress of Evolutionary Computation, 1EEE press ,2004:502 - 508.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部